-
2
-
-
0343152990
-
Quantum cryptography based on Bell's theorem
-
Ekert A K 1991 Quantum cryptography based on Bell's theorem Phys. Rev. Lett. 67 661
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661
-
-
Ekert, A.K.1
-
8
-
-
33846980802
-
Unconditional security of practical quantum, key distribution
-
Inamori H, Lütkenhaus N and Mayers D 2007 Unconditional security of practical quantum, key distribution Eur. Phys. J. D 41 599
-
(2007)
Eur. Phys. J.
, vol.D 41
, pp. 599
-
-
Inamori, H.1
Lütkenhaus, N.2
Mayers, D.3
-
9
-
-
0041415963
-
Quantum, key distribution with high loss: Toward global secure communication
-
Hwang W Y 2003 Quantum, key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91 057901
-
(2003)
Phys. Rev. Lett.
, vol.91
, pp. 057901
-
-
Hwang, W.Y.1
-
10
-
-
5044243044
-
Quantum key distribution with vacua or dim pulses as decoy states
-
Lo H-K 2004 Quantum key distribution with vacua or dim pulses as decoy states Proc. IEEE Int. Symp. on Information Theory p 137
-
(2004)
Proc. IEEE Int. Symp. on Information Theory
, pp. 137
-
-
Lo, H.-K.1
-
11
-
-
27744479495
-
Decoy state quantum, key distribution
-
Lo H-K, Ma X and Chen K 2005 Decoy state quantum, key distribution Phys. Rev. Lett. 94 230504
-
(2005)
Phys. Rev. Lett.
, vol.94
, pp. 230504
-
-
Lo, H.-K.1
Ma, X.2
Chen, K.3
-
12
-
-
27144453296
-
Practical decoy state for quantum, key distribution
-
Ma X, Qi B, Zhao Y and Lo H-K 2005 Practical decoy state for quantum, key distribution Phys. Rev. A 72 012326
-
(2005)
Phys. Rev. A
, vol.72
, pp. 012326
-
-
Ma, X.1
Qi, B.2
Zhao, Y.3
Lo, H.-K.4
-
13
-
-
27744568650
-
Beating the photon-number-splitting attack in practical quantum cryptography
-
Wang X-B 2005 Beating the photon-number-splitting attack in practical quantum cryptography Phys. Rev. Lett. 94 230503
-
(2005)
Phys. Rev. Lett.
, vol.94
, pp. 230503
-
-
Wang, X.-B.1
-
14
-
-
27144532069
-
Decoy-state protocol for quantum, cryptography with four different intensities of coherent light
-
Wang X-B 2005 Decoy-state protocol for quantum, cryptography with four different intensities of coherent light Phys. Rev. A 72 012322
-
(2005)
Phys. Rev. A
, vol.72
, pp. 012322
-
-
Wang, X.-B.1
-
15
-
-
33344454530
-
Experimental quantum key distribution with decoy states
-
Zhao Y, Qi B, Ma X, Lo H-K and Qian L 2006 Experimental quantum key distribution with decoy states Phys. Rev. Lett. 96 070502
-
(2006)
Phys. Rev. Lett.
, vol.96
, pp. 070502
-
-
Zhao, Y.1
Qi, B.2
Ma, X.3
Lo, H.-K.4
Qian, L.5
-
16
-
-
39049171347
-
Simulation and implementation of decoy state quantum key distribution over 60km telecom fiber
-
DOI 10.1109/ISIT.2006.261920, 4036338, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
Zhao Y, Qi B, Ma X, Lo H-K and Qian L 2006 Simulation and implementation of decoy state quantum key distribution over 60 km telecom fiber Proc. IEEE Int. Symp. on Information Theory pp 2094-2098 (Pubitemid 351244469)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 2094-2098
-
-
Zhao, Y.1
Qi, B.2
Ma, X.3
Lo, H.-K.4
Qian, L.5
-
17
-
-
0031076691
-
'Plug&play' systems for quantum crytography
-
Muller A, Herzog T, Hutter B, Tittel W, Zbinden H and Gisin N 1997 'Plug&play' systems for quantum crytography Appl. Phys. Lett. 70 793
-
(1997)
Appl. Phys. Lett.
, vol.70
, pp. 793
-
-
Muller, A.1
Herzog, T.2
Hutter, B.3
Tittel, W.4
Zbinden, H.5
Gisin, N.6
-
18
-
-
0011769922
-
Quantum key distribution over 67 km with a plug&play system
-
Stucki D, Gisin N, Guinnard O, Ribordy G and Zbinden H 2002 Quantum key distribution over 67 km with a plug&play system New J. Phys. 4 41
-
(2002)
New J. Phys.
, vol.4
, pp. 41
-
-
Stucki, D.1
Gisin, N.2
Guinnard, O.3
Ribordy, G.4
Zbinden, H.5
-
19
-
-
77649141651
-
-
www.idquantique.com
-
-
-
-
20
-
-
77649084367
-
-
www.magiqtech.com
-
-
-
-
21
-
-
33746447539
-
Über den. zentralen Grenzwertsatz der Wahrscheinlichkeitsrechnung und das Momentenproblem (in German)
-
Pólya G 1920 Über den. zentralen Grenzwertsatz der Wahrscheinlichkeitsrechnung und das Momentenproblem (in German) Math. Z. 8 171
-
(1920)
Math. Z.
, vol.8
, pp. 171
-
-
Pólya, G.1
-
22
-
-
33646373811
-
Trojan horse attacks on quantum key distribution systems
-
Gisin N, Fasel S, Kraus B, Zbinden H and Ribordy G 2006 Trojan horse attacks on quantum key distribution systems Phys. Rev. A 73 022320
-
(2006)
Phys. Rev. A
, vol.73
, pp. 022320
-
-
Gisin, N.1
Fasel, S.2
Kraus, B.3
Zbinden, H.4
Ribordy, G.5
-
23
-
-
44149092178
-
Quantum key distribution with an unknown and untrusted source
-
DOI 10.1103/PhysRevA.77.052327
-
Zhao Y, Qi B and Lo H-K 2008 Quantum key distribution, with an unknown and untrusted source Phys. Rev. A 77 052327 (Pubitemid 351717993)
-
(2008)
Physical Review A - Atomic, Molecular, and Optical Physics
, vol.77
, Issue.5
, pp. 052327
-
-
Zhao, Y.1
Qi, B.2
Lo, H.-K.3
-
24
-
-
46249109047
-
Experimental verification of the feasibility of a quantum channel between space and earth
-
Villoresi P et al 2008 Experimental verification of the feasibility of a quantum channel between space and earth New J. Phys. 10 033038
-
(2008)
New J. Phys.
, vol.10
, pp. 033038
-
-
Villoresi, P.1
-
25
-
-
33846431595
-
Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source
-
Wang X-B, Peng C-Z and Pan J-W 2007 Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source Appl. Phys. Lett. 90 031110
-
(2007)
Appl. Phys. Lett.
, vol.90
, pp. 031110
-
-
Wang, X.-B.1
Peng, C.-Z.2
Pan, J.-W.3
-
27
-
-
42349094990
-
General theory of decoy-state quantum cryptography with source errors
-
DOI 10.1103/PhysRevA.77.042311
-
Wang X-B, Peng C-Z, Zhang J and Pan J-W 2008 General theory of decoy-state quantum cryptography with source errors Phys. Rev. A 77 042311 (Pubitemid 351555244)
-
(2008)
Physical Review A - Atomic, Molecular, and Optical Physics
, vol.77
, Issue.4
, pp. 042311
-
-
Wang, X.-B.1
Peng, C.-Z.2
Zhang, J.3
Yang, L.4
Pan, J.-W.5
-
28
-
-
67949124558
-
Decoy-state quantum key distribution with both source errors and statistical fluctuations
-
Wang X-B, Yang L, Peng C-Z and Pan J-W 2009 Decoy-state quantum key distribution with both source errors and statistical fluctuations New J. Phys. 11 075006
-
(2009)
New J. Phys.
, vol.11
, pp. 075006
-
-
Wang, X.-B.1
Yang, L.2
Peng, C.-Z.3
Pan, J.-W.4
-
29
-
-
34249869818
-
Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors
-
Takesue H, Nam S W, Zhang Q, Hadfield R H, Honjo T, Tamaki K and Yamamoto Y 2007 Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors Nat. Photonics 1343
-
(2007)
Nat. Photonics
, vol.1343
-
-
Takesue, H.1
Nam, S.W.2
Zhang, Q.3
Hadfield, R.H.4
Honjo, T.5
Tamaki, K.6
Yamamoto, Y.7
-
30
-
-
54749155620
-
Experimental quantum key distribution with an untrusted source
-
Peng X, Jiang H, Xu B, Ma X and Guo H 2008 Experimental quantum key distribution with an untrusted source Opt. Lett. 33 2077
-
(2008)
Opt. Lett.
, vol.33
, pp. 2077
-
-
Peng, X.1
Jiang, H.2
Xu, B.3
Ma, X.4
Guo, H.5
-
31
-
-
2942611260
-
Quantum key distribution over 122 km of standard telecom fiber
-
Gobby C, Yuan Z L and Shields A J 2004 Quantum key distribution over 122 km of standard telecom fiber Appl. Phys. Lett. 84 3762
-
(2004)
Appl. Phys. Lett.
, vol.84
, pp. 3762
-
-
Gobby, C.1
Yuan, Z.L.2
Shields, A.J.3
-
32
-
-
0004011867
-
-
3rd edn (New York: McGraw-Hill) chapter 12.5
-
See, e.g., Keiser G 2000 Optical Fiber Communications 3rd edn (New York: McGraw-Hill) chapter 12.5
-
(2000)
Optical Fiber Communications
-
-
Keiser, G.1
-
33
-
-
66249132354
-
Megabits secure key rate quantum key distribution
-
Zhang Q et al 2009 Megabits secure key rate quantum key distribution New J. Phys. 11 045010
-
(2009)
New J. Phys.
, vol.11
, pp. 045010
-
-
Zhang, Q.1
-
34
-
-
56149113102
-
Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate
-
Dixon. A R, Yuan Z L, Dynes J F, Sharpe A W and Shields A J 2008 Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate Opt. Express 16 18790
-
(2008)
Opt. Express
, vol.16
, pp. 18790
-
-
Dixon, A.R.1
Yuan, Z.L.2
Dynes, J.F.3
Sharpe, A.W.4
Shields, A.J.5
-
36
-
-
34547400660
-
Upper bounds of eavesdropper's performances in finite-length code with the decoy method
-
DOI 10.1103/PhysRevA.76.012329
-
Hayashi M 2007 Upper bounds of eavesdropper's performances in. finite-length code with decoy method Phys. Rev. A 76 012329 (Pubitemid 47173757)
-
(2007)
Physical Review A - Atomic, Molecular, and Optical Physics
, vol.76
, Issue.1
, pp. 012329
-
-
Hayashi, M.1
-
38
-
-
44249110247
-
Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing
-
DOI 10.1103/PhysRevLett.100.200501
-
Scarani V and Renner R 2008 Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing Phys. Rev. Lett. 100 200501 (Pubitemid 351725955)
-
(2008)
Physical Review Letters
, vol.100
, Issue.20
, pp. 200501
-
-
Scarani, V.1
Renner, R.2
-
40
-
-
84947403595
-
Probability inequalities for sums of bounded random, variables
-
Hoeffding W 1963 Probability inequalities for sums of bounded random, variables J. Am. Stat. Assoc. 58 13
-
(1963)
J. Am. Stat. Assoc.
, vol.58
, pp. 13
-
-
Hoeffding, W.1
|